Month: June 2019

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Anti-malware Vendor Source Code Theft

Cybersecurity Threat Advisory: Anti-malware Vendor Source Code Theft

In light of the recent news about US Anti-malware companies getting hacked and their source code being stolen, SkOUT wants its customers to be aware of the situation and remain vigilant for the next few days as the investigation continues...

/ June 11, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: How Migration to Windows 10 Will Reduce the Risk of Threats

Cybersecurity Threat Advisory: How Migration to Windows 10 Will Reduce the Risk of Threats

What is the threat? The end of life date for Windows 7 will be January 14, 2020 at which point support will no longer be offered by Microsoft. Computers running older versions of Windows will be susceptible to cyber-attacks and...

/ June 11, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New ‘Sodinokibi’ Ransomware Exploits WebLogic Deserialization

Cybersecurity Threat Advisory: New ‘Sodinokibi’ Ransomware Exploits WebLogic Deserialization

What is the threat? A zero-day vulnerability in Oracle WebLogic Servers is actively being exploited in the wild by a sophisticated new ransomware variant dubbed “Sodinokibi”. The ransomware variant attempts to encrypt data found in the user directory and leverages...

/ June 11, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Dell Laptops and Computers Vulnerable to Remote Hijacks

Cybersecurity Threat Advisory: Dell Laptops and Computers Vulnerable to Remote Hijacks

What is the threat? A security researcher recently discovered a vulnerability (CVE-2019-3719) on Dell laptops and computers, giving full access to remote hijackers. The weakness lies in the Dell Supportable tool, which exposes dell devices to a remote code execution...

/ June 11, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Office 365 Blob Storage Phishing Attacks

Cybersecurity Threat Advisory: Office 365 Blob Storage Phishing Attacks

What is the threat? As part of an ongoing phishing campaign abusing Microsoft Azure Blob Storage, attackers are now able to create more legitimate looking phishing emails through Office 365. This tactic allows the attackers to spoof email addresses to...

/ June 11, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Remote code execution via Widget Connector

Cybersecurity Threat Advisory: Remote code execution via Widget Connector

What is the threat? Multiple high severity vulnerabilities have been found in the Widget Connector Macro in Atlassian Confluence Server. The server had an http vulnerability which allowed attackers to access restricted directories and execute commands on systems that run...

/ June 11, 2019
Cloud transition is still a struggle for many organizations

Cloud transition is still a struggle for many organizations

The cloud is hardly new, and public cloud growth numbers suggest that we are finally starting to reach a tipping point for cloud adoption. Yet thirteen years after AWS launched the first modern cloud service, an Accenture survey finds that...

/ June 11, 2019
Ask an MSP Expert: How can my MSP prepare for an economic recession?

Ask an MSP Expert: How can my MSP prepare for an economic recession?

Q: Right now, we have more business than we can handle, and cash flow is exceeding our projections for the year. Still, I get nervous and worry about the next downturn. Is there something I should be doing now to prepare...

/ June 10, 2019
Growth Hacking for MSPs: Help Desk Optimization

Growth Hacking for MSPs: Help Desk Optimization

If you have been following along with our Growth Hacking for MSPs series of posts, you probably now have a good idea of what growth hacking is and how you can apply the principles to your MSP. We have already...

/ June 10, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache fixes RCE flaw in Tomcat application server

Cybersecurity Threat Advisory: Apache fixes RCE flaw in Tomcat application server

What is the threat? A remote code execution vulnerability was discovered in the Apache Tomcat application server software – CVE-2019-0232. The Common Gateway Interface (CGI) servlet that this vulnerability affects is disabled by default, which is why the severity of...

/ June 9, 2019